Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:41
Static task
static1
Behavioral task
behavioral1
Sample
40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe
Resource
win10v2004-20221111-en
General
-
Target
40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe
-
Size
1.1MB
-
MD5
7436c3bc70b9fd2a0c299d451e5b8d4c
-
SHA1
34f47daa45b412a05321f6b5f5fc1ffee55cd4a0
-
SHA256
40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26
-
SHA512
555e307c0d36da7f2601b98f09fe2def3242ab24ba70ff7a3c1f26fa1a20f8d5f94eff30010eab93c1ba649bb97a1fd3b5058b9bd959396ce91b724a1c38f195
-
SSDEEP
24576:iio2C4Tz86EE1by3swR9HrwNmojHuD/bsytUltKo+5+VYrle5sY:k4TzJJm9R9kFTSbNtkwo+5Vrle5x
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exedescription pid process target process PID 4904 set thread context of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exepid process 3492 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 3492 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 3492 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 3492 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 3492 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exedescription pid process target process PID 4904 wrote to memory of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe PID 4904 wrote to memory of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe PID 4904 wrote to memory of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe PID 4904 wrote to memory of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe PID 4904 wrote to memory of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe PID 4904 wrote to memory of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe PID 4904 wrote to memory of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe PID 4904 wrote to memory of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe PID 4904 wrote to memory of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe PID 4904 wrote to memory of 3492 4904 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe 40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe"C:\Users\Admin\AppData\Local\Temp\40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\40892bc827539dc5c8e18732b51989b34e1f45cf73af6e1753549ea5570eca26.exe
- Suspicious use of SetWindowsHookEx
PID:3492